Unlock instant, AI-driven research and patent intelligence for your innovation.

Control of application access to system resources

a control and application technology, applied in the field of computer systems, can solve the problems of increasing the risk that the user will inadvertently (or perhaps intentionally) harm the computer resources, the administrator may inadvertently delete the files, and the risk of many programs failing to work as expected

Inactive Publication Date: 2007-08-23
SOFTWAREONLINE
View PDF48 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The invention provides a method for controlling access to system resources by an application based on its security context. This involves receiving definitions of multiple security contexts and assigning each application to a specific context based on its access requirements. The method allows for secure and efficient use of system resources by applications."

Problems solved by technology

In computing, if a task is performed by a user having more privileges than necessary to do that task, there is an increased risk that the user will inadvertently (or perhaps intentionally) do harm to computer resources.
By way of example, if a set of files can only be deleted by a user with administrator privileges, then an administrator may inadvertently delete those files when performing another task that does not need to be accomplished by an administrator.
Secondly, the user may elect to run the selected application as a non-administrator, and risk having many programs fail to work as expected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control of application access to system resources
  • Control of application access to system resources
  • Control of application access to system resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013]FIG. 1 illustrates an example of a suitable computing system environment 100 on which the invention may be implemented. The computing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing environment 100 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment 100.

[0014] Embodiments of the invention are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and / or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method executable in a system having a security mechanism that determines access by an application to system resources based on a security context in which the application is run includes receiving definitions of a plurality of security contexts. Each security context provides access to a respective set of the system resources. An association of each application of a plurality of applications with a respective one of the security contexts is received from the user. A first one of the applications is run subject to a first associated security context.

Description

PRIORITY CLAIM [0001] The present application claims priority from U.S. Provisional Application No. 60 / 727,288 filed Oct. 14, 2005, which is, along with commonly owned and co-pending U.S. application Ser. No. 11 / 351,257 filed on Feb. 6, 2006, U.S. patent application Ser. No. ______ (Attorney Ref. No. SFON-1-1005) entitled “Enhanced Browser Security,” U.S. patent application Ser. No. 11 / 5749,783 (Attorney Ref. No. SFON-1-1007) entitled “Control of Application Access to System Resources,” and U.S. Provisional Application No. 60 / 805,683 filed on Jun. 23, 2006, herein incorporated by reference in its entirety.FIELD OF THE INVENTION [0002] Embodiments of the invention relate generally to computer systems and, more particularly, to improvements in security for computer systems. BACKGROUND OF THE INVENTION [0003] In computing, if a task is performed by a user having more privileges than necessary to do that task, there is an increased risk that the user will inadvertently (or perhaps inten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04N7/16
CPCG06F21/6218G06F9/468
Inventor PLUMMER, DAVID W.
Owner SOFTWAREONLINE